Vulnerability Name: | CVE-2011-0807 (CCN-66928) | ||||||||
Assigned: | 2011-04-19 | ||||||||
Published: | 2011-04-19 | ||||||||
Updated: | 2011-09-22 | ||||||||
Summary: | Unspecified vulnerability in Oracle Sun GlassFish Enterprise Server 2.1, 2.1.1, and 3.0.1, and Sun Java System Application Server 9.1, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Administration. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 8.3 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
8.3 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-noinfo | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2011-0807 Source: CCN Type: SA44300 Sun GlassFish Enterprise Server and Java System Application Server Authentication Bypass Source: SREASON Type: UNKNOWN 8327 Source: CCN Type: Oracle Critical Patch Update Advisory - April 2011 Oracle Critical Patch Update Advisory - April 2011 Source: CONFIRM Type: Patch, Vendor Advisory http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html Source: CCN Type: OSVDB ID: 71948 Oracle Sun GlassFish Enterprise Server / Java System Application Server Crafted GET Request Authentication Bypass Arbitrary Code Execution Source: CCN Type: BID-47438 Oracle Sun GlassFish/Java System Application Server Remote Authentication Bypass Vulnerability Source: XF Type: UNKNOWN osgfes-admin-code-execution(66928) Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [08-05-2011] Source: CCN Type: Rapid7 Vulnerability and Exploit Database GlassFish Brute Force Utility Source: CCN Type: Rapid7 Vulnerability & Exploit Database GlassFish Brute Force Utility Source: CCN Type: ZDI-11-137 Oracle Application Server Authentication Bypass Remote Code Execution Vulnerability | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |